Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask DBMS Expert


Home >> DBMS

Question 1. What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy?

  • Router
  • VPN server
  • ICMP monitor
  • Proxy server

Question 2. The Cisco PIX line of products is best described as which of the following?

  • software firewall
  • PC with firewall installed
  • firewall appliance
  • VPN gateway

Question 3. Which of the following is a typical drawback of a free firewall program?

  • cannot monitor traffic in real time
  • oversimplified configuration
  • have centralized management
  • more expensive than hardware firewalls

Question 4. Which of the following is an advantage of hardware firewalls?

  • not scalable compared to software firewalls
  • not dependent on a conventional OS
  • less expensive than software firewalls
  • easy to patch

Question 5. What are the two standard ports used by FTP along with their function?

  • UDP 23 control, TCP 20 data
  • UDP 20 data, TCP 21 control
  • TCP 21 control, TCP 20 data
  • TCP 23 data, TCP 21 control

Question 6. Which of the following is true about private IP addresses?

  • they are assigned by the IANA
  • they are not routable on the Internet
  • they are targeted by attackers
  • NAT was designed to conserve them

Question 7. Which type of security device can speed up Web page retrieval and shield hosts on the internal network?

  • caching firewall
  • proxy server
  • caching-only DNS server
  • DMZ intermediary

Question 8. Which of the following is true about a dual-homed host?

  • serves as a single point of entry to the network
  • its main objective is to stop worms and viruses
  • uses a single NIC to manage two network connections
  • it is used as a remote access server in some configurations

Question 9. Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

  • one-to-one NAT
  • port address translation
  • one-to-many NAT
  • DMZ proxy translation

Question 10. Which of the following is a disadvantage of using a proxy server?

  • shields internal host IP addresses
  • slows Web page access
  • may require client configuration
  • can't filter based on packet content

Question 11. Which of the following is a type of VPN connection?

  • site-to-server
  • client-to-site
  • server-to-client
  • remote gateway

Question 12. Which of the following is NOT a factor a secure VPN design should address?

  • Encryption
  • Authentication
  • Nonrepudiation
  • performance

Question 13. Which IPsec component authenticates TCP/IP packets to ensure data integrity?

  • AH
  • ESP
  • IKE
  • ISAKMP

Question 14. Which of the following is NOT an essential element of a VPN?

  • VPN server
  • Tunnel
  • VPN client
  • authentication server

Question 15. Which of the following is NOT true about a hardware VPN?

  • should be the first choice for fast-growing networks
  • can handle more traffic than software VPNs
  • have more security vulnerabilities than software VPNs
  • create a gateway-to-gateway VPN

Question 16. Which of the following is true about the Internet?

  • it is the same as the World Wide Web
  • it was established in the mid-1960s
  • it was developed by a network of banks and businesses
  • it was originally built on an extended star topology

Question 17. Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?

  • ISP
  • POP
  • NAP
  • NSF

Question 18. What makes IP spoofing possible for computers on the Internet?

  • network address translation
  • the lack of authentication
  • the 32-bit address space
  • the DNS hierarchy

Question 19. What type of attack displays false information masquerading as legitimate data?

  • Java applet
  • Phishing
  • Buffer overflow
  • SQL injection

Question 20. Which of the following best describes ROI?

  • the chance that a threat will result in lost money
  • how long before an investment will pay for itself
  • the cost of mitigating a threat
  • the benefits of setting security priorities

Question 21. What is considered the first step in formulating a security policy?

  • risk analysis
  • elimination of threats
  • risk reduction
  • system monitoring

Question 22. Which of the following best describes a Monte Carlo simulation?

  • a technique for simulating an attack on a system
  • a formula that estimates the cost of countermeasures
  • a procedural system that simulates a catastrophe
  • an analytical method that simulates a real-life system for risk analysis

Question 23. Which of the following is a security-related reason for monitoring and evaluating network traffic?

  • to determine if your IDPS signatures are working well
  • to create substantial data to analyze
  • to optimize your router and switch protocols
  • to see how many files employees download form the Internet

Question 24. Which of the following is NOT typically an aspect of a security event management program?

  • monitoring events
  • managing IDPS firmware
  • managing data from sensors
  • managing change

Question 25. What should an outside auditing firm be asked to sign before conducting a security audit?

  • subpoena
  • nondisclosure agreement
  • search and seizure contract
  • social engineering covenant

DBMS, Programming

  • Category:- DBMS
  • Reference No.:- M91600295
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in DBMS

Sql injection on a searchthe way search performs its task

SQL injection on a search The way Search performs its task is by executing the following query (in a php script):          $var=stripslashes($_POST['search']);          $query = "SELECT username from lab1_login where use ...

Sql transactions exercisesconsider table itemnameprice

SQL Transactions Exercises Consider table Item(name,price) where name is a key, and the following two concurrent transactions. T1: Begin Transaction; Update Item Set price = 2*price Where name = 'pencil'; Insert Into Ite ...

The relation memberstudentid organizationid roleid stores

The relation Member(StudentId, OrganizationId, RoleId) stores the membership information of student joining organization. For example, ('S1', 'O2', 'R3') indicates that student with Id 'S1' joined the organization with i ...

Question suppose we have two kinds of doctors hospital

Question : Suppose we have two kinds of doctors: hospital doctors and family physicians. In addition to the doctor's id number, name, specialty, and years of experience, we want to record the hospital name for the hospit ...

Sql assignmentin these exercises youll enter and run your

SQL Assignment In these exercises, you'll enter and run your own SELECT statements. You will use the MyGuitarShop database for these queries. If you do not already have the MyGuitarShop database, the SQL script and the i ...

Assignment task -write and run sql statements to complete

Assignment Task - Write and run SQL statements to complete the following tasks Part A - DML 1. Show the details of the products where the product code starts with '22'. 2. Display the vendor details from areacode 615. 3. ...

Sqlwrite a select statement that returns one column from

SQL Write a SELECT statement that returns one column from the Vendor table named Full Name. Create this column from the VendorContactFName and VendorContactLName columns. Format it as follows: last name, comma, first nam ...

In this section the student is required to develop a

In this section, the student is required to develop a technical debate based on his/her understanding using available scientific literature. The answer to this question should not exceed three A4 Pages. In the traditiona ...

Question create an erd for the following scenarioa small

Question: Create an ERD for the following scenario. A small company ABC wants a database to keep track of internal company information. Â Given the following information create an ERD. The ABC Company has several departm ...

Football association of zambia faz super leaguethe faz has

Football Association of Zambia (FAZ) Super League The FAZ has recently decided to reorganise their operations to support both existing and possibly expanded league operations in Zambia and part of preparation for the 201 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As